routing verification as a service rvaas
play

Routing-Verification-as-a-Service (RVaaS) Trustworthy Routing - PowerPoint PPT Presentation

Routing-Verification-as-a-Service (RVaaS) Trustworthy Routing Despite Insecure Providers Liron Schiff Kashyap Thimmaraju Stefan Schmid Tel Aviv University, IL TU Berlin, DE Aalborg University, DK June 28, 2016 Liron, Kashyap, Stefan


  1. Routing-Verification-as-a-Service (RVaaS) Trustworthy Routing Despite Insecure Providers Liron Schiff Kashyap Thimmaraju Stefan Schmid Tel Aviv University, IL TU Berlin, DE Aalborg University, DK June 28, 2016 Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 1 / 20

  2. Trustworthy Routing At least a trustworthy Provider Deutsche Telekom - https://goo.gl/9QdFBR Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 2 / 20

  3. Trustworthy Routing Not all Providers offer that unfortunately New Scientist - https://goo.gl/b4x78q Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 3 / 20

  4. Make the Provider more trustworthy Trustworthy routing? Give the Users visibility Visibility to connectivity Visibility to routes Visibility to performance Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 4 / 20

  5. Make the Provider more trustworthy Trustworthy routing? Give the Provider confidentiality Keep the physical topology confidential Keep the network behaviour confidential Keep the Users data confidential Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 5 / 20

  6. The Internet and Us Implicit trust in the Provider’s routing Web Server 5.6.7.8 ISP B ISP C ISP A ISP D Client 1.2.3.4 Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 6 / 20

  7. Traceroute: Visbility in the Internet and into your Provider traceroute to www.google.com (216.58.213.228), 1 192.168.0.1 3.057 ms 3.045 ms 3.387 ms 2 83.169.183.46 16.876 ms 19.954 ms 21.451 ms 3 88.134.234.89 21.436 ms 21.101 ms 21.421 ms 4 88.134.235.10 32.163 ms 33.150 ms 5 88.134.202.25 31.163 ms 38.290 ms 38.282 ms 6 72.14.198.218 38.241 ms 34.813 ms 34.785 ms 7 209.85.249.134 34.759 ms 24.141 ms 21.078 ms 8 209.85.253.241 30.762 ms 30.367 ms 30.367 ms 9 216.58.213.228 17.861 ms 21.913 ms 23.298 ms Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 7 / 20

  8. SDN: Centralized Visibility and Control Is this the elixir for networking? Control- plane OpenFlow Data-plane An overview of what SDN offers: Granular visibility, Policing, (Re)Configuration, etc.. Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 8 / 20

  9. Outline Introduction Threat Model RVaaS Conclusion Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 9 / 20

  10. SDN: A compromized control plane Bob 5.6.7.8 Provider C Eve 6.6.6.6 Provider A Provider D Alice 1.2.3.4 A compromised control plane in Provider A can MITM Alice’s traffic to Eve Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 10 / 20

  11. The Threat Model The Clients/Users: Trusted or untrusted. The Provider: Physical Infrastructure: Trusted. Control plane: Untrusted. Data plane: Trusted. Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 11 / 20

  12. RVaaS Trustworthy routing Routing-Verification-as-a-Service Verifiable routing properties Confidentiality Low resource requirements Network Management RVaaS Provider A Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 12 / 20

  13. RVaaS Components Configuration Monitoring: Active/Passive Logical Verification: Header Space Analysis, Emulation In-band Test and Client Interaction: Packet-In, Packet-Out Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 13 / 20

  14. RVaaS What can RVaaS do? Client A can reach ISP B and ISP C. Which destinations can I reach? RvaaS Provider B Client A Provider A Provider C Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 14 / 20

  15. RVaaS Who would use RVaaS? ISPs Public cloud providers Private cloud providers Anybody who wants to keep track of their dataplane Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 15 / 20

  16. RVaaS Why use RVaaS? Network visibility Enhance Provider and Client relationship Verfication as a service Isolation checks Geo-location checks Fairness checks Routing/Forwarding table checks Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 16 / 20

  17. RVaaS in action RvaaS controller OpenFlow OpenFlow Packet Packet Out In 3 2 3 Integrity request packet 4 1 Auth A request A 4 packet B B A B Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 17 / 20

  18. RVaaS in action RvaaS controller OpenFlow OpenFlow Packet Packet In Out 2 3 Integrity 2 reply packet 4 1 Auth A A reply 1 packet B B A B Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 18 / 20

  19. Conclusion We lack visibility into our Providers network and the Internet SDN offers excellent visibility into the network RVaaS leverages SDN to deliver routing verification to Clients and Providers Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 19 / 20

  20. Questions? Liron, Kashyap, Stefan Routing-Verification-as-a-Service (RVaaS) June 28, 2016 20 / 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend